Riskin Group

Home   Security Directory   Security News   Top 50 Security Tools   Resources   Underground eStore   Geeky Photos   Links   About riskin  



Test your network security from a hacker's point of view with GFI LANguard N.S.S.!
Version 6 now detects wireless nodes & suspicious USB devices - Download today!

Underground Information and Internet Security Portal
 
[ search list ] [ become a member ]

Don't waste your time by searching the net! Become now an Astalavista.net member


Advanced Security Member Portal v2.0
With over 15'348 members the Advanced Security Member Portal is the largest security community on the net!

- Easy access to over 7'811 security/hacking tools
- More than 5,5 GB of data
- Vulnerabilities Database
- Online Investigation Tools
- Security Newsgroups/Mailing lists archive
- Contests (Wargames server)
- Moderated messageboards
- Daily updated, fast downloads
- Unique files and documents
- High availability
- and many more...




Join us now!


39.00 USD
99.00 USD
or
199.00 USD




Don't waste your time by searching the net! Become now an Astalavista member and find what you need! All about Computer and Network Security!


Astalavista Security Newsletter - Issue 16, April, 2005 is released
Past issues and information on how to subscribe New! Issue 16(PDF) New!

Paper of the week
Internet Censorship New

How to achieve blocking resistance

Astalavista's Multimedia
Astalavista FlashMovie 2005 (3 MB) New! Astalavista FlashMovie 2004 (3.87 MB)

Sites of the week
  • SpamMimic Hide a message in spam
  • WiFi-ToysWiFi related resources

  • Inside Astalavista
    Art Contest 2004 : Check out the winners and their banners!
    HOT & brand NEW! ASTALAVISTA FLASH.MOVIE 2005 (3.00 MB)
    NEW : Linking to Astalavista.com!

    We are always looking for new stuff! Submit it to us!
    Contact us, and share your thoughts about our site!
    Astalavista FAQ , please read it before contacting us, thanks a lot!
    History of Astalavista , everything you wanted to know about Astalavista
    New to Astalavista.com? first time visitor information
    Advertising Opportunities Advertise at Astalavista

    What do you think would be the next most significant trend in the InfoSec world during 2005?
    We would see an increase and evolution of spyware, it would become threat number 1
    Fears over possible terrorist attacks coordination over the Internet would result in very severe violation of our privacy rights
    We would witness nothing more besides the usual flood of worms
    I will stop using Internet Explorer :)
    We would see a perfect coordination between malware coders, spammers and phishers
    Cell phones malware will start targeting us much more often


    Astalavista Top 20 Featured Tools - last updated - Wednesday, 4th May, 2005
    Bluetooth ad-hoc network simulator
    WKnock
    World Wind 1.2 Recommended
    Cain & Abel v2.68 release Recommended
    GoogleSweep
    Orbitron 3.51
    Open Source Microsoft Exchange Replacement Recommended
    XML Security Library Recommended
    The SphereXP 0.83
    Pasco v1.0
    CookieWall Recommended
    hcovert - HTTP Payload Covert Channel
    BHODemon Recommended
    BTExplorer 0.2.9 Recommended
    An Automatic CS Paper Generator
    The scrutinizer toolkit - web servers (D)DoS protection Recommended
    LanSpy Recommended
    Remote fingerprinting tool for Oracle
    devialog - behavior/anomaly/signature based IDS Recommended
    IKE-Scan - VPN Scanning and Identification Tool
    Latest Directory Entries
    05/17/2005 How to Bypass Your Corporate Firewall Using SSH Tunneling
    05/17/2005 Nuclear Bunker Busters - clip
    05/17/2005 Reverse engineering and program understanding
    05/17/2005 Free Pascal
    05/17/2005 Cyberterror - prospects and implications
    05/17/2005 Phone Viruses - clip
    05/17/2005 Sekritz v1.0.0 :: Data Shrouder
    05/17/2005 fwlogsum - firewall log summariser
    05/17/2005 Darik's Boot and Nuke
    05/17/2005 Interface Traffic Indicator
    05/17/2005 Paul Wouters's personal spam statistics 1997-2004
    05/17/2005 Know your Enemy : Phishing - Behind the Scenes of Phishing Attacks
    05/17/2005 Computer System Sabotage in Critical Infrastructure Sectors
    05/17/2005 Biometrics - A look at facial recognition
    05/17/2005 National ID FAQ
    05/17/2005 A taxonomy of privacy
    05/17/2005 Inoculating SSH Against Address-Harvesting Worms
    05/17/2005 HT
    05/17/2005 harpoon
    05/15/2005 Cable Modem Sniffer
      Secrets and spies
      Spouses Using Spyware To Find Evidence Of Cheating
      Extortion via DDoS on the rise
      New Phishing Attack Uses Real ID Hooks
      Fortinet disputes Trend Micro patent ruling
      Microsoft Anti-Virus?
      Microsoft's Desktop Search Done
      Several Critical MSIE Flaws Uncovered
      Invalid banking cert spooks only one user in 300
      Will Clusty.com Be the Next Google?
      RSA patches Web authentication tool
      Dutch academics declare research free-for-all
      How To Avoid Getting Spyware
      Firefox's security coming under scrutiny
      Critical flaws found in IPsec protocols

    More News »
    Premium Link Partners
    Warez.com Hot
    NetworkSecurityForum New
    DallasCon
    WarIndustries.com
    Progenic.com New
    Web-Hack.ru
    NovaStream New
    Frame4.com
    SoftLinkers
    MegaSecurity.org New
    Bismark.it - Italian Security Site
    SecurityDocs.com
    Cracks and serials startpage
    Recommended Links
    PacketstormSecurity
    Sans Reading Room
    GlobalSecurity.org New
    BigBrother Awards
    CERT
    Phreedom.org
    Electronic Frontier Foundation
    Archive.org New
    HackInTheBox
    Anti-Phishing
    Association for Information Security
    Phrack.org New
    TheSmokingGun
    Cryptome.org New
    Electronic Privacy Information Center
    Secunia
    Honeynet Project
    Wardriving
    DShield.org New
    Information Warfare
    Slashdot New
    Incidents.org
    K-OTik Security Research New
    FAS New
    InfoSec Writers
    Window Security
    Astalavista Top 20 Featured Papers - last updated Wednesday, 4th May, 2005
    Hacking a SQL Server Recommended
    OIS Guidelines for Security Vulnerability Reporting and Response
    Viruses and Worms Recommended
    (IN)SECURE Magazine - Issue 1
    Spam Prevention in Voice over IP Networks Recommended
    Stopping Automated Attack Tools Recommended
    Complexity Theory - Network Centric Warfare
    Managing for Enterprise Security Recommended
    The Problem of Identity Theft
    Remote physical device fingerprinting Recommended
    Ritter's Crypto Glossary and Dictionary of Technical Cryptography
    An Introductory Resource Guide for Implementing the HIPAA act Recommended
    Windows vs. Linux Web Server Security Research Study
    Bluetooth tools
    The Art of Assembly Language Programming Recommended
    SQL Injection Signatures Evasion
    A Short Guide To C Programming Recommended
    Forensics and the GSM mobile telephone system
    An overview of Digital Rights Management (DRM)
    Information Warfare in the 21st Century Recommended




    DIVISIONS:   Astalavista.net

    © 1997-2005 Astalavista Team | Disclaimer | Contact us | About Astalavista | Advertising
    0.04958 sec